Mike Foster's IT Security & Best Practices Blog

Latest Posts

Quickly Identify an Attack Email Message–Know thy Enemy

Many attacks come from the outside world. Those attacks are directed at your users. There are two ways, and teach these to your workers, to identify almost all of these dangerous email messages before the user clicks on them.

Continue reading Quickly Identify an Attack Email Message–Know thy Enemy


Lighten Your Load–78 Items your Smartphone replaces

Perhaps you want to lighten your load. Perhaps you want to save money. Perhaps you want to make the most of your investment in your iPhone, iPad, Android, BlackBerry, etc. Brainstorming with CEOs, other senior level executives, and owners resulted in the following list of 78 items your device can replace.

Continue reading Lighten Your Load–78 Items your Smartphone replaces


Stop Attackers Who Bypass Your Firewall: Firewall or Failwall?

When a user gets one of those phishing emails about, “click here to…” and the user clicks, that communication just went through and your organization’s firewall probably didn’t even realize what was happening. Other than training users, there is a simple way to make up for the weakness of your organization’s firewall.

Continue reading Stop Attackers Who Bypass Your Firewall: Firewall or Failwall?


Why Siri is Such a Big Deal–Are You Serious?

New artificial intelligence tools, such as Siri, are a big deal since they “grow better” every second of every day. Since Siri is “hosted in the cloud” that means scientists can monitor and update Siri in real-time.

Continue reading Why Siri is Such a Big Deal–Are You Serious?


Cure Your 3 Biggest IT Security Problems–The Deadly Trio

I perform audits around the U.S. and there are three problems that commonly show up at the top of the “danger” list. There is a good chance that your organization has these problems too. Not only are they the three most prevalent dangers, it is self-evident that attackers look for common weak spots. Here are […]

Continue reading Cure Your 3 Biggest IT Security Problems–The Deadly Trio